Sciweavers

777 search results - page 106 / 156
» On Secure Mobile Ad hoc Routing
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Multi-path Admission Control for Mobile Ad hoc Networks
As wireless networks become more prevalent, users will demand the same applications that are currently available in wired networks. Further, they will expect to receive a quality ...
Anders Lindgren, Elizabeth M. Belding-Royer
ADHOC
2005
134views more  ADHOC 2005»
13 years 7 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
TWC
2008
245views more  TWC 2008»
13 years 7 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
ASMTA
2008
Springer
100views Mathematics» more  ASMTA 2008»
13 years 9 months ago
A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks
Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-toler...
Ahmad Al Hanbali, Roland de Haan, Richard J. Bouch...
IFM
2005
Springer
14 years 1 months ago
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks
Abstract. We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for t...
Lars Michael Kristensen, Michael Westergaard, Pede...